Public key based third party auditing system using random masking and bilinear total signature for privacy in public cloud environment

Author(s):  
J. Raja ◽  
M. Ramakrishnan
Author(s):  
Vitthal Sadashiv Gutte ◽  
Sita Devulapalli

Correctness of data and efficient mechanisms for data security, while transferring the file to and from Cloud, are of paramount importance in today's cloud-centric processing. A mechanism for correctness and efficient transfer of data is proposed in this article. While processing users request data, a set of attributes are defined and checked. States with attributes at different levels are defined to prevent unauthorized access. Security is provided while storing the data using a chunk generation algorithm and verification of chunks using lightweight Third-Party Auditor (TPA). TPA uses digital signatures to verify user's data that are generated by RSA with MD5 algorithms. The metadata file of generated chunks is encrypted using a modified AES algorithm. The proposed method prevents unauthorized users from accessing the data in the cloud environment, in addition to maintaining data integrity. Results of the proposed cloud security model implementation are discussed.


in the cloud store the data and use it from anywhere in the world but the users are worried of the data stored on the cloud in aspect of data integrity and validation of data. Therefore we are using Third Party Auditor (TPA) to ensure data integrity for ensuring data correctness on cloud. There are many auditing schemes existing but they have limitation so that we come up with a new approach of auditing. In this paper we have implemented a new scheme which efficient in performance over the cloud. It consists with two key one with users private and other with user’s public key. The user key has created a hash value from all the data with encoding framework. TPA performs the validation of data throughout any user’s action over the cloud. TPA generate the own signature and validate with users signature and keep the log of data all the time. It matches the both signature for data correctness .Validation of data shows the movements on users demand. The server keeps the all data watch over the performing action by users and TPA. The main objective is to show the correctness of data on cloud, maintain the integrity of data and provide a secure channel for privacy over the cloud usage. We have frame architecture to minimize the cost of cloud with TPA where minimum use of data on the TPA side. The system supports to batch auditing process and dynamic updating in usage


Distributed Cloud Environment (DCE) focuses mainly on securing the data and safely shares it to the user. Data leakage may occur by the channel compromising or with the key managers. It is necessary to safeguard the communication channel between the entities before sharing the data. In this process of sharing, what if the key managers compromises with intruders and reveal the information of the user’s key that is used for encryption. The process of securing the key by using the user’s phrase is the key concept used in the proposed system “Secure Storing and Sharing of Data in Cloud Environment using User Phrase (S3DCE). It does not rely on any key managers to generate the key instead; the user himself generates the key. In order to provide double security, the public key derived from the user’s phrase also encrypts the encryption key. S3DCE guarantees privacy, confidentiality and integrity of the user data while storing and sharing. The proposed method S3DCE is more efficient in terms of time, cost and resource utilization compared to the existing algorithm DaSCE (Data Security for Cloud Environment with Semi Trusted Third Party) [22] and DACESM (Data Security for Cloud Environment with Scheduled Key Managers) [23].


Author(s):  
M. Chaitanya ◽  
K. Durga Charan

Load balancing makes cloud computing greater knowledgeable and could increase client pleasure. At reward cloud computing is among the all most systems which offer garage of expertise in very lowers charge and available all the time over the net. However, it has extra vital hassle like security, load administration and fault tolerance. Load balancing inside the cloud computing surroundings has a large impact at the presentation. The set of regulations relates the sport idea to the load balancing manner to amplify the abilties in the public cloud environment. This textual content pronounces an extended load balance mannequin for the majority cloud concentrated on the cloud segregating proposal with a swap mechanism to select specific strategies for great occasions.


2021 ◽  
Vol 11 (1) ◽  
pp. 365-379
Author(s):  
Wisam Elmasry ◽  
Akhan Akbulut ◽  
Abdul Halim Zaim

Abstract Although cloud computing is considered the most widespread technology nowadays, it still suffers from many challenges, especially related to its security. Due to the open and distributed nature of the cloud environment, this makes the cloud itself vulnerable to various attacks. In this paper, the design of a novel integrated Cloud-based Intrusion Detection System (CIDS) is proposed to immunise the cloud against any possible attacks. The proposed CIDS consists of five main modules to do the following actions: monitoring the network, capturing the traffic flows, extracting features, analyzing the flows, detecting intrusions, taking a reaction, and logging all activities. Furthermore an enhanced bagging ensemble system of three deep learning models is utilized to predict intrusions effectively. Moreover, a third-party Cloud-based Intrusion Detection System Service (CIDSS) is also exploited to control the proposed CIDS and provide the reporting service. Finally, it has been shown that the proposed approach overcomes all problems associated with attacks on the cloud raised in the literature.


Animals ◽  
2021 ◽  
Vol 11 (3) ◽  
pp. 830
Author(s):  
Temple Grandin

In the U.S., the most severe animal welfare problems caused by COViD-19 were in the pork industry. Thousands of pigs had to be destroyed on the farm due to reduced slaughter capacity caused by ill workers. In the future, both short-term and long-term remedies will be needed. In the short-term, a portable electrocution unit that uses scientifically validated electrical parameters for inducing instantaneous unconsciousness, would be preferable to some of the poor killing methods. A second alternative would be converting the slaughter houses to carcass production. This would require fewer people to process the same number of pigs. The pandemic revealed the fragility of large centralized supply chains. A more distributed supply chain with smaller abattoirs would be more robust and less prone to disruption, but the cost of pork would be greater. Small abattoirs can coexist with large slaughter facilities if they process pigs for specialized premium markets such as high welfare pork. The pandemic also had a detrimental effect on animal welfare inspection and third party auditing programs run by large meat buyers. Most in-person audits in the slaughter plants were cancelled and audits were done by video. Video audits should never completely replace in-person audits.


Author(s):  
Jitendra Singh ◽  
Vikas Kumar

Regulatory compliance is equally binding on small and medium business groups. Owing to the small scale and limited budget, such SMBs are unable to seek expert advice. To adequately guard the SMBs in regulatory compliance, the present work proposed a third-party managed-end user-driven approach that renders the list of regulatory acts applicable in one's case according to the country of one's residence, services subscribed, and type of the operations to be carried out in subscribed cloud paradigm. The list of applicable regulatory acts are rendered at the subscriber's end only. In addition, the proposed method notifies the present state of compliance of under-considered cloud providers. Based on the recommendation received, the subscriber can proceed with his decision to subscribe or not to subscribe in the event if desired compliances do not exist. This technological assistance will eliminate the need to possess the required knowledge in regulatory acts or seeking advice from the regulatory expert.


Sign in / Sign up

Export Citation Format

Share Document